Current Threat: As the penetration of broadband Internet connections increases, more computers are online 24/7 both on and off the corporate network. As issues arise, network administrators and help desk staffs are required to remotely connect to these computers for maintanence, backup and repair. Unfortunately, many of these computers have gaping security holes, such as unpatched vulnerabilities and a lack of proper passwords, and there is a concern that remote access solutions may also breech security. Choosing the right one, such as RemotelyAnywhere or LogMeIn, can help a network manager increase productivity and reduce costs while keeping a network secure.
When users think of Internet data security, they are usually concerned about data encryption – to the point where security is measured in the length of the encryption key used. However, encryption and decryption, while being very important, are fairly trivial tasks compared to the other challenges faced by designers of secure systems. In its security whitepaper, data encryption is just one of the five main goals set forth by the designers of LogMeIn.
LogMeIn was designed to allow secure remote access to critical resources over an untrusted network. During the development of the software, security considerations always prevailed over usability concerns. The following security design objectives, listed in order of priority, guided the decision-making process:
Security and attack mitigation
Authentication and authorization of users to the target resource
Authentication of the target resource to users
Authentication and authorization of users within the target resource
Conclusion: A well-designed remote access solution can greatly increase productivity and provide a rapid return on investment. When deployment is done with care and LogMeIn’s optional security features are utilized, the benefits greatly outweigh the risks.
500 Unicorn Park Drive, Suite 103
Woburn, MA 01801 USA
Download the document
From Info Security Products Guide site: CLICK HERE